General

  • Target

    de2b61fd7f24fde837ccf861550591c8_JaffaCakes118

  • Size

    202KB

  • Sample

    240913-lxvehsxalr

  • MD5

    de2b61fd7f24fde837ccf861550591c8

  • SHA1

    21fa1534706480cc7d134ee8e2f0548f591ea8f9

  • SHA256

    4de13d45c48a164d280e6b783a10ec919b62d9677789cf77e9dd51cd2522403e

  • SHA512

    9443533d7c1e56cb90cb525f3d64b11866f6176ef1ece51f37864ac60ccb24951fbbc1ba2396d370c6ce67c0c7178b9e607e201ea98f62d6c06df504acff8944

  • SSDEEP

    3072:Pjh9N4a1j712h9Td2+1lxvTeZna8xUhUbT15z:PjdFKdoSxvixTxUA

Malware Config

Extracted

Family

cobaltstrike

Botnet

0

C2

http://69.12.73.177:6666/dot.gif

Attributes
  • access_type

    512

  • create_remote_thread

    768

  • crypto_scheme

    256

  • host

    69.12.73.177,/dot.gif

  • http_header1

    AAAABwAAAAAAAAADAAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • http_header2

    AAAACgAAACZDb250ZW50LVR5cGU6IGFwcGxpY2F0aW9uL29jdGV0LXN0cmVhbQAAAAcAAAAAAAAABQAAAAJpZAAAAAcAAAABAAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • http_method1

    GET

  • http_method2

    POST

  • maxdns

    255

  • pipe_name

    \\%s\pipe\msagent_%x

  • polling_time

    60000

  • port_number

    6666

  • sc_process32

    %windir%\syswow64\rundll32.exe

  • sc_process64

    %windir%\sysnative\rundll32.exe

  • state_machine

    MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCI4nl6bZXPNGrwqJZHAH5PodfbH00rzLKmYc7SxfbLtaPLmMtmPBUUvEpcusVi1mf7d38nZ4DqhWvZ+dtkUBXmrNYYRJRZzW954MmC3p7VBSpIIPLfJe6UJLP4oeVuFDftAODKcgpd7icOKHios6KZh/gnanS/3alLOIRQdtDifwIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • unknown1

    4096

  • unknown2

    AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • uri

    /submit.php

  • user_agent

    Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; QQDownload 733; .NET CLR 2.0.50727)

  • watermark

    0

Targets

    • Target

      de2b61fd7f24fde837ccf861550591c8_JaffaCakes118

    • Size

      202KB

    • MD5

      de2b61fd7f24fde837ccf861550591c8

    • SHA1

      21fa1534706480cc7d134ee8e2f0548f591ea8f9

    • SHA256

      4de13d45c48a164d280e6b783a10ec919b62d9677789cf77e9dd51cd2522403e

    • SHA512

      9443533d7c1e56cb90cb525f3d64b11866f6176ef1ece51f37864ac60ccb24951fbbc1ba2396d370c6ce67c0c7178b9e607e201ea98f62d6c06df504acff8944

    • SSDEEP

      3072:Pjh9N4a1j712h9Td2+1lxvTeZna8xUhUbT15z:PjdFKdoSxvixTxUA

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks